Shameless self-plug here. I wrote a blog post to document my methodology after having some issues with publicly available examples of using Podman and traefik in a best-practices config. Hopefully this finds the one other person that was in my shoes and helps them out. Super happy for feedback if others care to share.

  • StarkZarnOP
    link
    fedilink
    English
    21 day ago

    The other poster here is correct, this is just an account of my journey through self hosting traefik, and ultimately headscale, without the hurdles along the way. I tried to include a few links to unclear terms along the way in the narrative, maybe those would help you figure things out. Unfortunately I can’t write for an audience of everyone, but hopefully you can still gain some value or learn some new things! Thank you for the feedback.

    • deadcatbounce
      link
      fedilink
      English
      28 hours ago

      Wasn’t being critical at all. Not expecting you to write for anyone.

      I wondered what this actually provides. If you were explaining to someone with a good knowledge of the world, not grandma!!

      • StarkZarnOP
        link
        fedilink
        English
        13 hours ago

        No worries, and I’ll accept criticism too, that’s how you improve.

        Anyway, this is effectively giving you tailscale, a remote access mesh VPN solution, but with total control and ownership of the control plane server, instead of relying on the opaque tailscale owned and controlled infra. I touched on it briefly again the ‘DERP Config’ section of part 2: https://roguesecurity.dev/blog/headscale-quadlet-part2#DERP Config